- 
			
Using Wake on LAN with Linux
How to switch on your computer remotely.
 - 
			
Linux Home Office
VNC solutions.
 - 
			
Safeguarding against ransomware and data loss
The way to avoid data loss is to have backup copies.
 - 
			
Improve your online security with a Password Manager
What is a password manager, and which one should you use, if any?
 - 
			
Protecting yourself from a targeted attack
What to do when you're at high risk to be the target of an attack.
 - 
			
How to recover an ether.li Ethereum wallet
You only know it works when you've tested it.
 - 
			
Is that email genuine?
Find out how to recognize fake emails.
 - 
			
Anonymity and Privacy on the Internet — Part I
Hiding your IP address.
 - 
			
Anonymity and Privacy on the Internet — Part II
Avoid to leave your fingerprint.
 - 
			
Anonymity and Privacy on the Internet — Part III
Obtaining an anonymous email account.
 - 
			
Apparmor - How to use it
Where to start when building an apparmor profile for an application.
 - 
			
The Linux Audit System, or Who Changed That File?
How to properly set up and use the Linux Audit System to find out who modified some file.
 - 
			
Exploring processes
Some simple ways of getting information about a running process.
 - 
			
GCC compiler benchmarks
Performance comparison of GCC versions ranging from 3.3.6 to 4.6.0. Also includes results for LLVM (upto 3.0).
 - 
			
Sandboxed firefox
This article is intended to give a short but concise howto for running firefox (or any other graphical application) under a different (nonprivileged) user.
 - 
			
Securing a VPS or dedicated server
Everybody writes about proactive security, thus this article focuses on something different: "intrusion resistance", i.e. the ability to confine an intrusion and limit the potential damage.
 - 
			
Intrusion detection: unprivileged intruders
Suggestions for detecting intruders hiding under the identity of legitimate shell users.
 - 
			
Defending against brute force ssh attacks
An overview of different methods (and their respective trade-offs)for dealing with the problem.
 - 
			
A comparison of file integrity checkers
This comparison focuses on technical performance — in particular in corner cases which are likely to reveal problems —, rather than simply listing and comparing features.
 - 
			
Linux kernel rootkits
A paper describing different ways of subverting the Linux kernel, and methods for detection of kernel rootkits.
 - 
			
Sniffer detection on an IPV6-enabled Linux system
What works, and what doesn't.
 - 
			
Signed software
PGP signatures on open source software, and why you should check them.
 - 
			
Passwords and password generators
Some remarks on passwords and various kinds of password generators.
 - 
			
Internet services on Linux
How to determine what internet services are running on your machine, and how to switch them off.
 - 
			
Email Address/Text Encoder
Helps you to hide your email address from spambots that harvest addresses from websites.
 - 
			
Compile-Howto
Beginners tutorial / howto / guide on compiling applications from source.